Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(54)

Side by Side Diff: ipc.cc

Issue 7326013: GCC 4.6 warnings cleanup (Closed) Base URL: http://seccompsandbox.googlecode.com/svn/trunk/
Patch Set: '' Created 9 years, 3 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch | Annotate | Revision Log
« no previous file with comments | « no previous file | library.cc » ('j') | no next file with comments »
Toggle Intra-line Diffs ('i') | Expand Comments ('e') | Collapse Comments ('c') | Show Comments Hide Comments ('s')
OLDNEW
1 // Copyright (c) 2010 The Chromium Authors. All rights reserved. 1 // Copyright (c) 2010 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be 2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file. 3 // found in the LICENSE file.
4 4
5 #include "debug.h" 5 #include "debug.h"
6 #include "sandbox_impl.h" 6 #include "sandbox_impl.h"
7 7
8 namespace playground { 8 namespace playground {
9 9
10 #ifndef IPC_PRIVATE 10 #ifndef IPC_PRIVATE
(...skipping 87 matching lines...) Expand 10 before | Expand all | Expand 10 after
98 if (!g_policy.unrestricted_sysv_mem && 98 if (!g_policy.unrestricted_sysv_mem &&
99 (shmat_req.shmaddr || shmat_req.shmflg || 99 (shmat_req.shmaddr || shmat_req.shmflg ||
100 shmat_req.shmid != info->mem->shmId)) { 100 shmat_req.shmid != info->mem->shmId)) {
101 info->mem->shmId = -1; 101 info->mem->shmId = -1;
102 SecureMem::abandonSystemCall(*info, -EINVAL); 102 SecureMem::abandonSystemCall(*info, -EINVAL);
103 return false; 103 return false;
104 } 104 }
105 105
106 info->mem->shmId = -1; 106 info->mem->shmId = -1;
107 SecureMem::sendSystemCall(*info, SecureMem::SEND_UNLOCKED, shmat_req.shmid, 107 SecureMem::sendSystemCall(*info, SecureMem::SEND_UNLOCKED, shmat_req.shmid,
108 shmat_req.shmaddr, shmat_req.shmflg); 108 const_cast<void*>(shmat_req.shmaddr),
109 shmat_req.shmflg);
109 return true; 110 return true;
110 } 111 }
111 112
112 bool Sandbox::process_shmctl(const SecureMem::SyscallRequestInfo* info) { 113 bool Sandbox::process_shmctl(const SecureMem::SyscallRequestInfo* info) {
113 // Read request 114 // Read request
114 ShmCtl shmctl_req; 115 ShmCtl shmctl_req;
115 SysCalls sys; 116 SysCalls sys;
116 if (read(sys, info->trustedProcessFd, &shmctl_req, sizeof(shmctl_req)) != 117 if (read(sys, info->trustedProcessFd, &shmctl_req, sizeof(shmctl_req)) !=
117 sizeof(shmctl_req)) { 118 sizeof(shmctl_req)) {
118 die("Failed to read parameters for shmctl() [process]"); 119 die("Failed to read parameters for shmctl() [process]");
(...skipping 27 matching lines...) Expand all
146 // of a kernel bug, we make sure that the address does not fall into any 147 // of a kernel bug, we make sure that the address does not fall into any
147 // of the reserved memory regions. 148 // of the reserved memory regions.
148 if (!g_policy.unrestricted_sysv_mem && 149 if (!g_policy.unrestricted_sysv_mem &&
149 isRegionProtected((void *) shmdt_req.shmaddr, 0x1000)) { 150 isRegionProtected((void *) shmdt_req.shmaddr, 0x1000)) {
150 info->mem->shmId = -1; 151 info->mem->shmId = -1;
151 SecureMem::abandonSystemCall(*info, -EINVAL); 152 SecureMem::abandonSystemCall(*info, -EINVAL);
152 return false; 153 return false;
153 } 154 }
154 155
155 info->mem->shmId = -1; 156 info->mem->shmId = -1;
156 SecureMem::sendSystemCall(*info, SecureMem::SEND_UNLOCKED, shmdt_req.shmaddr); 157 SecureMem::sendSystemCall(*info, SecureMem::SEND_UNLOCKED,
158 const_cast<void*>(shmdt_req.shmaddr));
157 return true; 159 return true;
158 } 160 }
159 161
160 bool Sandbox::process_shmget(const SecureMem::SyscallRequestInfo* info) { 162 bool Sandbox::process_shmget(const SecureMem::SyscallRequestInfo* info) {
161 // Read request 163 // Read request
162 ShmGet shmget_req; 164 ShmGet shmget_req;
163 SysCalls sys; 165 SysCalls sys;
164 if (read(sys, info->trustedProcessFd, &shmget_req, sizeof(shmget_req)) != 166 if (read(sys, info->trustedProcessFd, &shmget_req, sizeof(shmget_req)) !=
165 sizeof(shmget_req)) { 167 sizeof(shmget_req)) {
166 die("Failed to read parameters for shmget() [process]"); 168 die("Failed to read parameters for shmget() [process]");
(...skipping 98 matching lines...) Expand 10 before | Expand all | Expand 10 after
265 // other SysV IPC calls. 267 // other SysV IPC calls.
266 deny: 268 deny:
267 info->mem->shmId = -1; 269 info->mem->shmId = -1;
268 SecureMem::abandonSystemCall(*info, -EINVAL); 270 SecureMem::abandonSystemCall(*info, -EINVAL);
269 return false; 271 return false;
270 } 272 }
271 } 273 }
272 #endif 274 #endif
273 275
274 } // namespace 276 } // namespace
OLDNEW
« no previous file with comments | « no previous file | library.cc » ('j') | no next file with comments »

Powered by Google App Engine
This is Rietveld 408576698